CHAPTER 1 PRINCIPLES OF NETWORK MONITORING

Size: px
Start display at page:

Download "CHAPTER 1 PRINCIPLES OF NETWORK MONITORING"

Transcription

1 CHAPTER 1 PRINCIPLES OF NETWORK MONITORING Jawwad Shamsi and Monica Brocmeyer Department of Computer Science, Wayne State University 5143 Cass Avenue, 431 State Hall, Detroit, MI 48202, USA { jshamsi, mbrockmeyer }@wayne.edu Efficient and cost-effective measurement of network characteristics is pivotal for distributed systems deployed on the Internet. The network characteristics are utilized by Internet-based distributed systems to provide better service to the user and enhance performance for the application. This chapter provides a detailed analysis of existing techniques for the measurement of the four important network characteristics which include latency, bandwidth, path detection and loss rate. The chapter describes key concepts related to network measurements, including techniques for clock synchronization, strategies for time stamping of probes, methods for network analysis, difference between active and passive measurements and comparison of round trip vs. one way delay measurements. It elaborates the usefulness of different transport and network layer protocols (i.e. TCP, UDP and ICMP) for obtaining network measurements and continue this discussion to describe some important measurement tools such as Ping, Traceroue, Pathchar, Sting, Scriptroute, Spruce and Paris Traceroute. The chapter explains the effectiveness and limitations of these tools with respect to the measurement of network characteristics. 1. Introduction The effectiveness of a distributed application providing service to its end users depends largely on the characteristics of the underlying network. A web server is of no use if its immediate router fails and all the paths leading to the web server becomes unavailable. Similarly, a VoIP (Voice over IP) service has restricted functionality if the available bandwidth is limited. The two examples mentioned above are not infrequent. Internet based systems observes enough uncertainty and unpredictability that effect the quality and 1

2 2 J. Shamsi and M. Brockmeyer effectiveness of distributed systems. This uncertainty strive the need for monitoring of various network characteristics, both at the level of the service provider and the application. An ISP (Internet Service Provider) may monitor the bandwidth used by its customers, in order to allow a fair share of the bandwidth usage, whereas an application could periodically measure latency to its servers in order to detect congestion and failure. 1.1 Which network characteristics are relevant for measurements? The significance and relevance of network characteristics varies with applications. A content distribution network may be interested in measuring latency from its clients to the application server, whereas a load balancing application may find available bandwidth as a useful criterion to adjust the load on the servers. Other network characteristics such as congestion, queuing delay, network failure, topology discovery, and bottleneck determination also have great significance. However, there are four network characteristics that constitute the basic paradigm of network measurements and could be utilized in the computation of other related network characteristics. They are mentioned below Latency: Latency refers to the time taken by the message to traverse from the sending host to the destination host. It is usually measured in milliseconds (ms). Latency of a path has a great significance for many applications. For many applications latency is used to determine the availability of the servers and select nearest available server in terms of latency, specifically in the content distribution networks. Further, variation in latency (i.e. the deviation between the successive latency measurements) is used to determine the quality of the path and detect network congestion. Packet Loss: If the rate of packets sent from the source host is not equal to the rate of packets received at the destination host then the path experiences packet loss. Loss rate of a path is the rate (in percentage) at which packets are being lost while traversing through the network path. Lost packets affect the performance of the application as they are often required to be retransmitted. Even when the packets cannot be retransmitted (for example, such as the live transmission of audio or video streams) a high packet loss could lead to low application performance. Due to these reasons it is always desirable to select paths with low loss rate.

3 Principles of Network Monitoring 3 Path Detection: When a message is sent across the Internet, it traverses through various intermediate routers to reach the destination. Path detection is the process of determining the actual path taken by the message in reaching from source to destination. Since there are many possibilities for a path from one host to another, path detection enables an application to determine the actual path taken by the message during transmission. Path changes are possible on the Internet, therefore path detection also facilitate in determining a change in the path between two nodes. It can also be used as a sanity check to determine or isolate network failure. Bandwidth: Bandwidth refers to the capacity of the path to transfer data in a unit time. It is measured in bits per second (bps). Bandwidth has great implication for multimedia applications. Such applications generally have high bandwidth requirements. If the available path has limited bandwidth than the multimedia application suffers degraded performance. Bandwidth detection tools can be used to infer the path quality and select appropriate path. The purpose of the chapter is to develop reader skills and proficiency related to network measurements. The chapter elucidates basic concepts about network monitoring and explains several approaches and tools for the measurement of the four basic network characteristics. The chapter also discusses practical issues related to development of network monitoring tools. The chapter assumes that the reader has the understanding of basic networking terms such as the seven layer OSI model and familiarity with the transport layer protocols such as TCP and UDP. 2. Background Information Network monitoring is a very vast and rigorous topic. In order to thoroughly explain the concepts, this section mentions some background information. The information includes description about different types of network monitoring and explanation of underlying protocols used for monitoring. Readers may also refer to Section 9 of this chapter that explains some key terms associated with network monitoring Types of Network Monitoring There are two basic approaches for network monitoring, active monitoring and passive monitoring.

4 4 J. Shamsi and M. Brockmeyer Active Monitoring Active monitoring involves injecting probes in the network, specifically for the purpose of monitoring. Active monitoring bears the cost of sending additional traffic in the network; however, under most scenarios, the packet size is relatively small compared to the actual capacity of the network, therefore the cost of injecting additional traffic is minimal. The cost of injecting traffic can be reduced by decreasing the probing rate; however, this may reduce the quality of the measured characteristics. Active monitoring provides full control with respect to monitoring interval, packet size and the path to be monitored. Further, the data obtained is not specific to any particular application. Passive Monitoring Passive monitoring is the process of observing the existing network traffic and collecting information from it without injecting additional monitoring probes in the network. In a passive measurements based system, network measurement information is retrieved through the packets which are sent as a part of another application. Packets are captured by monitoring application, which is deployed either on the source and the destination hosts or along the path through a tap a. The passive mode of monitoring avoids the overhead of introducing measurement traffic in the network and also evades the use of stale data for measurements. However, in passive mode the monitoring application has little or no control over probing interval, packet size or the path to be monitored. Further, due to increase in the capacity of the core links it is expensive to identify and measure the packet of a particular flow. Passive monitoring could also raise privacy concerns. The preference for the type of monitoring varies with the application. For instance, an application measuring the performance of an existing application such as an intrusion detection system might prefer a passive approach, where as an application employing performance enhancement measures such as load balancing may desire an active scheme. An application may also employ a combination of the passive and active schemes for higher efficiency. The Wren grid monitoring system utilizes such a scheme, in which the passive mode is used a A tap is a hardware device which provides a way to capture data along a path. A tap usually has three connection points. Two connection points are connected to each end of the path, where as the third point is connected to a monitor which listens for the information. Tap is not a sink, i.e., it copies all the information to the monitor and the communication between the two ends of the path remains uninterrupted.

5 Principles of Network Monitoring 5 when an application is sending messages, whereas the active mode is used when the application is silent [18] Network protocol For passive monitoring, the measurement system has no choice for the underlying protocol of network measurement, i.e. the monitoring application monitors packets that are sent as a part of another application. However, in the active mode, the measurement system has to decide about the underlying protocol used for sending probes. Many choices are available and they are discussed below. ICMP ICMP or Internet Control Message Protocol is the underlying protocol for the famous ping utility. It operates at the networking layer. The principle advantage of the ICMP based measurement tools is simplicity and ease of use. ICMP-based schemes do not require connection setup or handshake. Further, they do not require any specific implementation at the recipient end, i.e. only the host sending the active probes implements mechanism for sending the ICMP probes. Since ICMP messages are control messages, an ICMP request is automatically replied by the destination host. However, the automatic response capability of the host could be exploited by attackers and is seen as security vulnerability. ICMP will be discussed further when we analyze the ping utility. TCP TCP (Transmission Control Protocol) is the underlying protocol for many internet applications including WWW and FTP. It operates at the transport layer. Unlike ICMP based tools, TCP-based utilities bear the overhead of the TCP handshake b. TCP-based tools also require that the destination host runs a service on a designated port. The sending host establishes TCP connection to the destination through the TCP handshake and sends probes to the destination host at the server port. The server at the destination replies with a response that is used for network measurement. b TCP handshake is a three-way process. In the first step, the host initiating the connection sends a TCP SYN packet. The recipient host responds with an ACK packet. Finally, the original host sends a SYN ACK packet. All the three packets contain sequence numbers for proper identification.

6 6 J. Shamsi and M. Brockmeyer An important limitation of the TCP based tools is that since TCP is not a packet based protocol, it makes its own decisions about sending packets. By using various optimizations, including Nagle algorithm [34], TCP coalesces packets of small sizes. Since TCP has a large overhead including a 40 byte header (20 byte for IP and 20 for TCP), these optimizations allow TCP to conserve bandwidth. At the user level, it is difficult to force TCP to send packets at a specific interval [44]. In some cases, the requirement of a running service at the destination can be eliminated using TCP ACK and RST. According to RFC 793 [33], if a sender sends a TCP ACK packet to a closed c TCP port, then the TCP at the destination will reply with the TCP RST packet and the same sequence number as of the TCP ACK packet in the request. In such a case, the TCP RST can be used as a response. However, this type of request-response method can be used only if the response from the destination host is not specific to the request, i.e. the response is not generated based on the contents in the request. UDP UDP (User Datagram Protocol) is a datagram-based protocol that operates at the transport layer. Unlike TCP, UDP does not require a handshake. Additionally, UDP has an 8 byte header (plus 20 byte IP header) that results in lower overhead than TCP. Since UDP is a packet protocol it allows sending probe packets at controlled intervals. Moreover, UDP is a connectionless protocol in which a lost request (or a response) can be effectively used to detect packet loss. Like TCP, UDP can also eliminate the need to run a service at the destination port. If a UDP request is received at a port at which the service is not running, then it responds by sending ICMP destination unreachable message to the sender. Many other choices such as DCCP (Datagram Congestion Control Protocol) and SCTP (Stream Control Transmission Protocol) also exist. The selection of underlying protocol for network monitoring is based on the requirements and restrictions from an application. 3. Network Characteristics Having identified the basic principles of monitoring, this section describes various approaches for the measurement of network characteristics. Each of the c A port that is not running any TCP service

7 Principles of Network Monitoring 7 four network characteristics, latency, loss-rate, path detection and bandwidth, are discussed in a subsection which explains the basic concepts about the characteristic and describes various approaches for its measurements Latency Latency has been the most widely measured network characteristic. It refers to the time (in ms) taken by the packet to traverse from the sending host to the destination host. Latency between two hosts could vary due to two reasons: First, variation is possible due to changes in queuing delay or congestion and second due to route changes. When a packet is sent from sender to receiver, it traverses through multiple intermediate routers, each of which has variable queuing delay. Therefore, two successive packets could follow different routes, resulting in differing latency for each.. Route changes are quite common due to congestion or network failure. Therefore, the variation in latency can be utilized to depict congestion between the two end points, where paths with low congestion observes more consistency in latency. The notion of latency mentioned here represents the one-way latency from the sender to the receiver (commonly refers to the One-Way Delay or OWD). It is measured by subtracting the time that packet is sent by the sending host, from the time that packet is received at the recipient host. Besides OWD, the word latency is also sometimes used to refer to the Round Trip Time (RTT), between the two hosts. This involves the time taken by the packet to reach the recipient host from the sending host and the reply from the recipient host to the sending host. Figure 1 depicts the difference between OWD and RTT.

8 8 J. Shamsi and M. Brockmeyer Fig. 1. OWD vs. RTT. Example 1: Assume the round trip time between two Internet hosts is 200 ms. What is the one way latency (OWD) between them? Solution: Unknown. The internet is asymmetric, i.e. the forward and the backward routes between two hosts are not necessarily the same. Therefore OWD is not necessarily equal to one half of RTT. Example 2: What is the RTT between two internet hosts A and B, if the one way latencies of the forward and backward paths between them are 91 ms and 92 ms? The host B takes 200 usec on average to respond to the probes. Solution: RTT = = ms. RTT implies the effective communication delay for applications that are requestresponse applications such as WWW and FTP. In comparison, OWD is useful

9 Principles of Network Monitoring 9 communication tool for applications that have one way communication such as multicast. In case of a large message transfer, the end-to-end latency of a message is higher then the packet latency. Large messages are usually disassembled into small packets and transferred to the destination. At the destination, the message is reassembled into its original form. The processes of disassembling and assembling are called as fragmentation and de-fragmentation, respectively. The capacity of a path to transfer a message without fragmentation depends upon its MTU or Maximum Transmission Unit, where MTU of a path denotes the size of the IP datagram that can be transferred. It usually varies for different networks; however for Ethernet it is equal to 1500 bytes. The end to end path between two internet hosts may compose of links with different MTUs. In such a scenario, intermediate routers may perform the fragmentation according to the capacity of each link. We now describe some important latency measurement techniques. Measurement Strategies The measurement strategy for latency is simple. The sending host sends a packet and waits for the response. When the response is received, it subtracts the sent time stamp from the received time stamp and computes the round trip latency. For OWD, however, the destination host notes the time at which the request is received at the destination and includes it in its response to the original sender which computes OWD by subtracting the sending time from the time at which the request was received at the destination. A major requirement for the measurement of OWD is to synchronize clocks of the two nodes. Note that the underlying protocol could be ICMP, TCP or UDP. The methodology mentioned above is confined to active monitoring. For passive monitoring, the monitoring host can monitor the existing flows form an application and compute RTT. For instance, a web client can compute its RTT with a web server by comparing time stamps of the HTTP request and HTTP response Loss rate The loss rate of a path is the rate at which packets are being dropped while traversing through the path. There could be multiple reasons for packet loss. Most commonly, for a path with limited bandwidth, the intermediate routers buffer the packets in the queue. However, if a queue at the router approaches its

10 10 J. Shamsi and M. Brockmeyer storage capacity then the router drops the packet. Packet loss could also occur due to hardware failure at the router or at the destination host. It can also happen due to the packet being corrupted because of noise in the path. The detection of the packet loss is challenging. In theory, packet loss can be detected if a response to a request is not received by the sender within a certain amount of time. However, the sender (the entity sending the request) faces a challenge in determining the duration of the timeout. A response from the destination host could be delayed due to multiple reasons including high RTT, congested path, heavily loaded server or even low connection speed at the sender. If a sender adopts a safe-passage by implementing a large timeout time then it suffers from poor performance, since a lost packet might be detected earlier; on the other hand if the waiting time is small, then the sender might end up causing Fig. 2. Examples of Packet Loss. congestion in the network by sending multiple requests, or might erroneously conclude that a packet is lost when, in fact, the packet is just delayed. While there is no perfect answer to determine the duration of the waiting time, most of distributed applications adopt a safe approach and keeps a longer waiting time. For instance, the time out for a DNS query is 15 seconds. Measurement Strategies Packet loss is measured by initiating a timer for each probe and noting the probes for which the response is not received. Note that in such a case, the direction of

11 Principles of Network Monitoring 11 packet loss is unknown i.e., if the request from sender is lost or the response from the destination has failed to reach the sender (see Figure 2). This information is important for many applications that use one-way communication such as multicast. In the next section, we will analyze the sting tool [37], which computes loss rate in both directions Path Detection An internet path consists of various hops connected by routers. Path detection is the process of determining information (including name and IP address) about all intermediate routers traversed when a packet is sent across an Internet path. Note that path detection is different from the topology discovery. The former is the process of determining only the intermediate routers that are traversed by a packet when it is sent along the path, whereas the later is the process of determining all the combinations of a path between two Internet hosts. Path detection tools can be utilized to discover topology. Figure 3 illustrates a scenario where several routes exist for a path from client X to the server Y. Fig. 3. Possibilities for a path. The computation of Internet paths is achieved through routing protocols, which are categorized in two broad categories: Internet Gateway Protocols and Exterior Gateway Protocols such as BGP. The former refers to the routing within an autonomous system d, whereas the later is used when the routing is done across autonomous systems. d An autonomous system (AS) is a collection of networks and routers that maintain a single routing policy. An AS could be under control of one or more entities and is uniquely identified by an AS number [35].

12 12 J. Shamsi and M. Brockmeyer Measurement Strategies Path detection strategies are based on using TTL (Time-to-live) values in the IP header. The purpose of the TTL is to avoid infinite looping (IP routing cycle) of IP packets. TTL is an 8 bit field which indicates the number of hops or routers a packet can be traversed, before it must reach its destination or be discarded. When a packet traverses a path, each intermediate router examines the TTL value of the packet. If the TTL value is greater than 1, then the TTL value is decremented by 1 and the packet is sent to the next hop, which could be another router or the final destination host. However, if the TTL valuee is 1, then the router discards the message and sends an ICMP time exceeded message to the original sender. The ICMP time exceeded message indicates that the TTL field has expired, the packet has failed to reach the destination and it has been discarded. The ICMP time exceeded message contains the address of the router that generates the message. Path detection tools work by sending a series of packets with increasing TTL to the final destination. Since the TTL value is gradually increased in the series, each intermediate router once receives a packet having TTL value equal to 1 and sends a reply to the original sender with ICMP time exceeded message. The sender can thus obtain information about all the routers in the path. Example 3: Can path detection tools be used to measure RTT to a specific hop? Solution: Path detection tools can be used to measure RTT. When the original sender receives an ICMP time exceeded message it can compare the send time stamp of the probing packet, with the received time stamp of the ICMP message to compute RTT to a particular hop 3.4. Bandwidth Bandwidth quantifies the data rate at which a network link or a network path can transfer [31]. It is measured in bps or bits per second. Unlike latency, where the end-to-end characteristic of a path is computed by aggregating the latency of the individual links, the bandwidth of a path is the capacity of the link with minimum bandwidth. e When the destination host receives a packet with a TTL value of 1, it delivers the packet to the application.

13 Principles of Network Monitoring 13 The term bandwidth can be used to refer to two different types of speeds. Upload speed denotes the rate at which data is being sent to the destination, while download speed refers to the rate at which data is being received. If a path has similar upload and download speed then it is called as bandwidth-symmetric. Most of the internet backbone is bandwidth symmetric. However, this is not necessarily true for end users, including home users relying on cable or ADSL. The reason for this difference is that most home users are typically interested in downloading, therefore ISPs (Internet Service Providers) allocates more resources for downloading. Note that a bandwidth-symmetric path is not necessarily symmetric in route or vice versa. The two entities are separate and must not be confused with each other. For the measurement of bandwidth two terms are relevant, capacity and available bandwidth. Capacity Capacity refers to the maximum data rate a link can transfer. It is measured as the number of data units (bits) transferred in a unit time (sec). The capacity of a link depends upon the transmission medium and is usually constant at the link-layer (OSI layer2). For instance, for a gigabit Ethernet, the capacity of a link is equal to one gigabit per second. However, this capacity refers to the capability of a link excluding any overhead. Remember, at the IP-layer (layer 3), IP packets are encapsulated in link-layer frames such as Ethernet frames, therefore the actual capacity must also consider the overhead associated in transmitting data in frames. For instance, for Ethernet the overhead consists of 38 bytes in that 14 bytes for Ethernet header, 4 bytes for CRC f (cyclic redundancy check) 8, bytes for the frame preamble g and the 12 bytes for the inter frame gap h [31]. The actual capacity of the path considering the overhead can be expressed as f Cyclic Redundancy Check- Checksum to detect errors in the frame. g A preamble is a 7 byte field, which is a combination of ones and zeros. It is used for synchronization purposes. The preamble field is followed by a 1 byte start of frame delimiter (SFD). The combination of both the preamble and SFD fields takes 8 bytes. h Interframe gap is a delay a network device must wait before it can attempt to transmit a frame. This ensures that a device which has previously transmitted a frame has reverted back to the listening mode. The interframe gap must be 96 bit times. For 10 Mbps, it takes 100 nanoseconds to transmit one bit, therefore 96 bit times is equal to 9.6 micro seconds, which is equal to 12 bytes.

14 14 J. Shamsi and M. Brockmeyer L C = C L (1) O + L where, C is the actual capacity at the IP level. C L is the capacity at the link level, O is the overhead needed to encapsulate IP packet and L is length of the Ethernet frame. Therefore the actual capacity of a link varies with the transmission technology. Example 4 further clarifies the concept. Example 4 Compute the capacity of a path for a 10 base T link with an Ethernet frame size of Solution Given: C L = 10 Mbps, O=38 bytes and L= 1400 bytes Placing values in equation (1), we get C = 9.73 Mbps The capacity of a path that consists of several links is equivalent to the capacity of the link with minimum capacity. Due to this reason minimum capacity link is also called as the narrow link. Available Bandwidth The available bandwidth is the unused capacity of the link. At any moment a link is either transmitting at full speed or is idle [31]. Therefore, the utilization (µ) of a link is expressed as an average which is computed over a series of time intervals. Therefore the available bandwidth (A) is equal to the total capacity minus average usage, where usage is expressed as a fraction of the total capacity. A = C( 1 µ ) (2) The link with the minimum available bandwidth is known as the tight link. The available bandwidth of a path equals to the available bandwidth of the tight link. Measurement Strategies The available bandwidth of a path can be computed by measuring the amount of data transferred over a unit time. Strauss [41] has categorized the existing bandwidth measurement tools into two models.

15 Principles of Network Monitoring 15 Probe Gap Model: The Probe Gap Model (PGM) can be explained as follows. The sender sends two probes that are separated by a time interval of t 1. The two probes arrive at the receiver separated by an interval of t 2. If t 2 > t 1, it implies that the probes have experienced a delay during their traversal. Assuming a single bottleneck that induces delay, t 2 t 1 is the amount of delay experienced at the bottleneck. If the capacity (total bandwidth) of the bottleneck is known to be C, then the utilization at the bottleneck is t2 t1 µ = C( ) (3) t 1 Since the model assumes a single bottleneck, the utilization of the path is also equal to the utilization at the bottleneck. Therefore, the available bandwidth of the path is t2 t1 A = C(1 ) (4) t 1 A major limitation of the PGM is that it assumes that there is a single bottleneck with a known capacity. Probe Rate Model: The Probe Rate Model (PRM) is based on idea of creating congestion in the network. A series of packets are sent along the path. If the sending rate of packets at the sender matches with the arrival rate of packets at the receiver, then it implies no congestion. Therefore, the sending rate is increased to the point where the arrival rate becomes lower than the sending rate. At this point congestion is detected in the network, and the instance is referred as turning point. The sending rate just before the beginning of congestion denotes the available bandwidth. Note that PRM has a larger overhead as compared to the PGM as it requires induction of congestion in the path. 4. Measurements Tools This section describes some important measurement tools. The section is divided in to five subsections. The first four subsections are dedicated to each specific

16 16 J. Shamsi and M. Brockmeyer network characteristic, whereas as the last subsection describes some tools that have multiple usages Latency Measurements Ping Ping is a widely used latency measurement utility. It is built in to most operating systems, including UNIX and Windows. Ping has multiple usages: It can be used to measure RTT between two hosts or to detect packet loss along a path. It works by sending ICMP echo request packets to the destination host and listening to the ICMP echo reply messages. The ICMP echo request is a type of message which must be replied by every host or a router via the ICMP echo reply message and the data of the echo request message must be unaltered in the echo reply message. The sending host sends a series of ping messages that are identified using probe sequence numbers and the corresponding echo reply messages are used to compare the time stamps of the probes and compute RTT. Ping infers a statistical summary of the path latency characteristics including minimum, maximum and average RTT and the packet loss to the destination host. Ping is inexpensive and flexible measurement utility since it does not require the destination host to run any service or listen to any particular port. Fping Fping [9] is an enhancement to the ping utility. Ping is limited as it can only send messages to a single destination host at a time. Fping improves upon this restriction by sending probes to multiple hosts. The hosts can be specified on the command line or through a file. However, the underlying protocol of fping is still ICMP. Both Ping and Fping may demonstrate limited accuracy as many routers or firewalls filter or rate-limit ICMP packets due to security concerns [37]. Recall that we mentioned that every host that receives echo request sends an echo reply. If a firewall filters ping packets then it will drop the packet before it reaches its intended destination. Since the packet will be dropped, the source will not receive echo request message and the echo reply message will not be sent. In such a case, the usability of ping remains limited. Several additional tools which measure latency, as well as other network characteristics are described in Section 4.5.

17 Principles of Network Monitoring Loss rate Latency measurement techniques utilizing active monitoring approach can be utilized to estimate loss rate along the path. Packet loss can be detected by using a timer. Usually, a timer is set whenever a probe request is sent, and is cancelled when the probe response is received. In this manner, a signal is raised whenever a response is not received, which indicates a lost packet. We now describe how the sting tool can be utilized to estimate loss rate in both directions. Sting Sting [37] is a TCP based tool which measures packet loss between two Internet hosts. It can precisely detect the direction of the packet loss i.e. if the loss has occurred in the forward direction (from source to target) or in the reverse direction from (target to source). Sting requires the target host to run a TCPbased service such as a web or telnet server. The Sting protocol is divided into two phases. In the first phase, the source host sends a series of TCP data packets to the service running on the target host. Each packet has a sequence number i one greater than the sequence number of the preceding packet in the series. The target host responds with an acknowledgement for each received packet. In the second phase, the source host initially sends a data packet with a sequence number one greater than the sequence number of the last data packet sent in the first phase. The target host responds by sending a probe with an appropriate acknowledgement number such that if packet loss occurs during the first phase then the acknowledgement number indicates the sequence number of the first lost packet, otherwise the acknowledgement number indicates the next expected packet. In case of packet loss during the first phase, the source responds by retransmitting the lost packet. The process continues until all the lost packets are retransmitted. At the end of the second phase, the loss rate can be computed using the total number of packets sent and the number of retransmitted packets. i Recall that in TCP each packet has a 32 bit sequence number and a 32 bit acknowledgement number. The sequence number uniquely identifies each packet and is used to arrange out of order arrival of packets at the target. The acknowledgment number is used by the target to acknowledge the receipt of the data packet. When a target host receives a packet, it sends and acknowledgement back to the sender with the acknowledgement number equal to the expected sequence number of the next packet. The acknowledgement number also implies that all the packets with the preceding sequence number have been received by the target. The acknowledgement number is not incremented if an out of order message is received. For efficiency, many implementations of TCP delay sending the acknowledgement until they received a next packet or a time out occurs.

18 18 J. Shamsi and M. Brockmeyer The procedure described above is useful for computing packet loss in the forward direction. For the packet loss in the reverse direction, the sender counts the number of acknowledgements received from the target. In order to ensure that target sends acknowledgement for each packet received from the sender and does not delay sending the acknowledgement, the sender sends the packet with some delay. Example 5: Consider sting is used to detect packet loss along a path. If the source sends 100 packets during the first phase and three packets during the second phase then compute the packet loss in the forward direction. Solution: In the first phase, 100 packets are sent. In the second phase, the source sends 3 packets. Therefore, two of the three packets must be the retransmitted packets. Therefore = 98 packets are received at the target. Therefore the forward loss rate is 2/100 =2 % Path Detection Traceroute Traceroute (tracert in Windows) is a path tracing utility that is used for path detection or network failure diagnosis. Traceroute works by sending a series of IP packets with incremental values of the TTL. At each step, three packets with the same TTL value are sent. For instance, the first three packets have a TTL value of one while the next three packets contain a TTL value of two and so on. When the first series of packets (with a TTL of 1) arrives at the first hop, the router discards the packet and sends ICMP time exceeded message with its address as the source address to the original sender. In this manner, a series of traceroute messages are sent in which a TTL value is gradually incremented, the sending host then collects the information about each router along the path and constructs the network path. The traceroute utility prints the information about each hop-router on the screen. During this process, if a message is lost, or if a router is configured not to reply with an ICMP time exceeded message then an asterisk (*) is printed. The choice of the underlying protocol for the traceroute is platform dependent. The original specification proposed by Jacobson [14] uses UDP packets, with

19 Principles of Network Monitoring 19 UNIX utilizing the same choice. The UDP packets are destined for ports from to The ports are used by Traceroute, since they are unlikely to be selected by an application. Thus, when the destination receives a probe at the port at which no service is running it responds with an ICMP destination unreachable message. The Windows implementation of traceroute utilizes ICMP echo request (similar to ping). Note that this does not alter the reply from the router when TTL reaches 1, as in both the cases (UNIX or Windows), the router will send the ICMP time exceeded message to the original sender. Due to security issues, some networks block incoming traceroute packets. In such a scenario, traceroute can only display the router hops up to the firewall router of the network. TCPtraceroute TCPtraceroute is a TCP-based implementation of traceroute. The motivation behind using TCP is to bypass firewalls that block UDP and ICMP, as most firewalls permit TCP-based inbound traffic. Unlike conventional traceroute schemes which send UDP or ICMP echo messages and wait for ICMP time exceeded messages, TCPtraceroute sends TCP SYN message to the destination port 80 (Since port 80 is the known port for the web, most firewalls allow packets intended for port 80). If the target host is running any service on the port 80 then it responds with a SYN ACK, otherwise it will reply with an RST message. If the sender receives a SYN ACK message then it will sends an RST message to reset the connection. Paris Traceroute Paris Traceroute [1] is developed to improve the accuracy of the traceroute utility. Traceroute suffers from two major flaws: First, it can occasionally report false links between routers and second, it can miss existing links between the routers. To understand these two deficiencies, consider the example illustrated in Figure 4.

20 20 J. Shamsi and M. Brockmeyer Figure 1 Traceroute Problems (based on the example mentioned in [1]) The Traceroute client sends traceroute packets with increasing TTL to the server. Router A implements load balancing j and selects either router C or router D based on the load balancing policy. For the first traceroute packet sent by the client with a TTL value of 1, the router A drops the packet and replies with an ICMP time exceeded message. If the second packet with a TTL value of 2 is forwarded to router B (where it is dropped) and the third packet with TTL value of 3 is forwarded to router C (where it is dropped at router E), then it would appear that there is a link between router B and router E. Additionally the link between router C and router E remains unnoticed. The first flaw is the appearance of a false link between C and D, whereas the second deficiency is the failure to observe the link between C and E. Paris traceroute corrects these two problems by maintaining the probe packet header in a manner that permits all probes to follow the same path in case of per flow load balancing [1]. In order to achieve this, Paris traceroute modifies the packet header information such that the load balancing portion of the header remains constant. This implies that the other fields in the header are modified such that the load balancing fields remains constant and the response packets are matched with the probe packets. Paris traceroute achieves this task as follows: In case of ICMP traceroute packets, Paris traceroute modifies the sequence number and the identifier field. For UDP packets, Paris traceroute varies the checksum field. Since checksum is used for data integrity, payload of the packet is also modified. j A Router has multiple interfaces. Load balancing implies that in order to route a message to the destination, a router selects an interface based on the load on the network. Load can be balanced based on per packet, per flow or per destination policy [3] [16]. In per packet balancing, each packet is balanced separately, whereas per flow balancing works by sending all the packets of a particular flow to the same interface. A flow is identified using various fields in the IP header and the transport header. These include the source address, source port, destination address, destination port, the protocol, the type of service (TOS), ICMP code and checksum fields. In per destination policy, load is balanced according to the destination.

21 Principles of Network Monitoring 21 However, since per packet load balancing is random, Paris traceroute is unable to completely eliminate these problems when per packet load balancing is used Bandwidth Pathload Pathload [15] is a bandwidth measurement tool, based on the PRM model. It induces congestion in the network and monitors the OWD between the source and the target. The moment where the OWD increases marks the start of congestion and the bandwidth can be computed. Note in order to compute OWD, Pathload does not require synchronized clocks at both ends as it is only interested in detecting changes in OWD. Pathchar Pathchar [26] is a tool to measure capacity at each hop. Like the traceroute utility, it uses the TTL field in the packet header to get a response from each hop and measure RTT. The path-capacity estimation is based on the principle that the RTT to each hop consist of three components: (i) serialization delay, which is the time utilized to serialize the packet for transmission along a path (ii) propagation delay, the time taken by a packet to traverse along the path, and (iii) queuing delay, the delay encountered by a packet while waiting in a queue at the router before being processed. Of the three delay components, the serialization delay depends upon the size of the packet (L) and the capacity (C) of the path, i.e. L /C, the propagation delay is constant, whereas the queuing delay varies with size of the packet and the available bandwidth of the path. To measure path capacity at hop n, pathchar sends a series of probes with same packet size and with a fixed TTL value of n. The n th hop router responds by sending an ICMP time exceeded message for each received probe. Pathchar obtains the RTT from the ICMP response for each probe. In this manner, a series of RTT values for the n th hop are obtained. Pathchar assumes the minimum RTT observed represents an instance in which the probe and its response did not experience any queuing delay. Therefore, the minimum RTT value consists of only two components: (1) propagation delay and (2) serialization delay. Of the two, the later is a function of path capacity and packet size. Since packet size is

22 22 J. Shamsi and M. Brockmeyer known, the path capacity can be computed via the slope of the minimum RTT up to hop n [31]. One major limitation of pathchar is that it assumes that every router which receives an IP packet with TTL of 1 responds with an ICMP time exceeded message. This assumption works fine for layer-3 routers, however, for layer-2 routers, which operate at the link layer and route messages on MAC addresses, this is not true [32]. Layer-2 devices create serialization delays based on packet size and path capacity, however they do not respond with ICMP error messages. As a result, the estimated capacity is not accurate. Spruce Spruce [41] is a bandwidth measurement tool that is built on the PGM model. It uses a probe pair to estimate the available bandwidth along a path. It utilizes a series of probe pair responses and computes the average. TCP throughput or Bulk Transfer Capacity (BTC) measurement TCP throughput is the capability of the path to transfer TCP traffic in bulk. Note that this capability may differ from the actual capacity of the path due to many reasons. These include TCP flow control, packet loss, TCP congestion avoidance, routing preferences. Since a large portion of Internet activity constitutes TCP traffic, TCP throughput provides an estimate of effective communication capacity in most cases. Iperf [13] is a tool that measures TCP throughput over an Internet path. It works by sending bulk TCP streams over the path and measuring the amount of payload and the delay encountered for transmission. Iperf requires access to two machines that can act as a sender and a receiver. It provides various configuration options to the user. Iperf can also be used for measuring UDP throughput. Alternatively, Iperf can also be used to generate bulk amount of TCP/UDP traffic in the network. It is available for major operating systems including UNIX and windows and also has an available GUI interface Multi-purpose tools In section 4.1, we described the ping tool which can be used to measure RTT and loss rate. We also explained traceroute in section 4.3 which can be used to detect

23 Principles of Network Monitoring 23 route, measure RTT or estimate packet loss. Besides the ping and the traceroute utilities there are several other tools which have multiple usages. Scriptroute Scriptroute [38] [39] is a public network measurement infrastructure. It allows users to run their network measurement scripts through a web interface and measure latency, detect packet loss or estimate a path. The scriptroute facility maintains a list of active servers which runs the scriptroute daemon. Each active server runs a web server through which it accepts the user scripts via the CGI post format. The measurement scripts are written in Ruby a user friendly scripting language. The web server invokes the Ruby interpreter which parses the script and interacts with the scriptroute daemon to facilitate measurement in a controlled environment. The scriptroute daemon sends measurement packets via a raw socket k interface. Scriptroute measurement packets are generated based on the type of request submitted by the user. For instance, if a user desires to execute traceroute to the destination host then TTLlimited UDP messages will be generated. Finally, the response from the destination is matched to the probe request and result is displayed on the web interface. The major advantage of scriptroute is that it aims to provide general availability to the normal users. Another benefit is that the measurements are run in a controlled environment to prevent security threats such as DOS attacks. Pathping Pathping [27] is a multi-purpose network utility. It is used to detect the route to the destination and compute hop-level RTT and loss rate, i.e., latency and loss rate for all the intermediary hops from the source to the destination. It is built-in on Windows operating system. Pathping is a combination of traceroute (tracert) and ping. It first sends the traceroute messages to the destination host and determines all the intermediary routers. It then sends ping messages (through ICMP echo messages) to the intermediary routers and compute latency and loss rate. The advantage of Pathping is that it can detect the packet loss to intermediary routers and thus can k Raw socket is a term used to denote for a socket that is delivered to an application without stripping the headers, i.e., without going through the TCP/IP stack.

24 24 J. Shamsi and M. Brockmeyer be used for network diagnosis. Since the analysis is computed over a longer time period, the results are extensive compared to the normal ping. For this reason, Pathping analysis could also take longer time. 5. Indirect Measurements The measurement aspects explained so far employ direct measurements, i.e., endto-end characteristics of a path are measured directly, either through actively sending probes to the destination and reading the response, or through passively monitoring existing flows sent by some other application. Direct mode provides rapid and accurate mechanism for measurements. However, the schemes based on direct measurements have limited scalability. In a network of n nodes, if each node is to measure its characteristics to every other node then there would be O(n 2 ) end-to-end measurements. Therefore, often indirect measurements are utilized for improved performance. The indirect mode involves use of heuristics or tomography to estimate the network characteristics of a path. The direct measurements from one or more components of a path are utilized to estimate end to end characteristics. As a result, the indirect method is not precise, however it incurs lower overhead. In large networks and in applications where an approximate of measurement is sufficient (such as locating proximity of a node), indirect measurements are utilized. Figure 5 illustrates an example of indirect measurements, where network characteristics of a path between nodes A and C can be estimated if characteristics of paths AB and BC are known. Figure 2 - Example of Indirect Measurement The end-to-end path characteristics are computed through an aggregation function, which varies with the network characteristic. For instance, in case of latency, the overall latency from node A to node C is the sum of the latencies for

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

NETWORK LAYER/INTERNET PROTOCOLS

NETWORK LAYER/INTERNET PROTOCOLS CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

TEIN2 Measurement and Monitoring Workshop. Bruce.Morgan@aarnet.edu.au

TEIN2 Measurement and Monitoring Workshop. Bruce.Morgan@aarnet.edu.au TEIN2 Measurement and Monitoring Workshop Bruce.Morgan@aarnet.edu.au Introduction Agenda TEIN2 Topology Network Monitoring Network Measurement Day 1 Session I: Introduction 09:00-09:30 Introduction to

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

IP addressing and forwarding Network layer

IP addressing and forwarding Network layer The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP

More information

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s) v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best

More information

Subnetting,Supernetting, VLSM & CIDR

Subnetting,Supernetting, VLSM & CIDR Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Performance Measurement of Wireless LAN Using Open Source

Performance Measurement of Wireless LAN Using Open Source Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions) COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools

More information

Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers

Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers So, what is path discovery and why is it important? Path discovery

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss

File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss White Paper File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss Introduction In today s complex networks it is often difficult to correlate different measurements that are reported by network

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

Cisco Configuring Commonly Used IP ACLs

Cisco Configuring Commonly Used IP ACLs Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Network Models and Protocols

Network Models and Protocols 669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal

More information

pathchar a tool to infer characteristics of Internet paths

pathchar a tool to infer characteristics of Internet paths pathchar a tool to infer characteristics of Internet paths Van Jacobson (van@ee.lbl.gov) Network Research Group Lawrence Berkeley National Laboratory Berkeley, CA 94720 MSRI April 21, 1997 c 1997 by Van

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Computer Networks UDP and TCP

Computer Networks UDP and TCP Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

Network Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Network Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 21-1 ADDRESS MAPPING The delivery

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Internet Protocols. Addressing & Services. Updated: 9-29-2012

Internet Protocols. Addressing & Services. Updated: 9-29-2012 Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Chapter 11. User Datagram Protocol (UDP)

Chapter 11. User Datagram Protocol (UDP) Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Wide Area Network Latencies for a DIS/HLA Exercise

Wide Area Network Latencies for a DIS/HLA Exercise Wide Area Network Latencies for a DIS/HLA Exercise Lucien Zalcman and Peter Ryan Air Operations Division Aeronautical & Maritime Research Laboratory Defence Science & Technology Organisation (DSTO) 506

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

The Fundamentals of Intrusion Prevention System Testing

The Fundamentals of Intrusion Prevention System Testing The Fundamentals of Intrusion Prevention System Testing New network-based Intrusion Prevention Systems (IPS) complement traditional security products to provide enterprises with unparalleled protection

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Компјутерски Мрежи NAT & ICMP

Компјутерски Мрежи NAT & ICMP Компјутерски Мрежи NAT & ICMP Riste Stojanov, M.Sc., Aleksandra Bogojeska, M.Sc., Vladimir Zdraveski, B.Sc Internet AS Hierarchy Inter-AS border (exterior gateway) routers Intra-AS interior (gateway) routers

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Operating Systems and Networks Sample Solution 1

Operating Systems and Networks Sample Solution 1 Spring Term 2014 Operating Systems and Networks Sample Solution 1 1 byte = 8 bits 1 kilobyte = 1024 bytes 10 3 bytes 1 Network Performance 1.1 Delays Given a 1Gbps point to point copper wire (propagation

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information

IP Routing Features. Contents

IP Routing Features. Contents 7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................

More information

First Midterm for ECE374 02/25/15 Solution!!

First Midterm for ECE374 02/25/15 Solution!! 1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

VoIP network planning guide

VoIP network planning guide VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

Network Layer: Address Mapping, Error Reporting, and Multicasting

Network Layer: Address Mapping, Error Reporting, and Multicasting CHAPTER 21 Network Layer: Address Mapping, Error Reporting, In Chapter 20 we discussed the Internet Protocol (IP) as the main protocol at the network layer. IP was designed as a best-effort delivery protocol,

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information